Edge-based auditing method for data security in resource-constrained Internet of Things
Published 2020 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Edge-based auditing method for data security in resource-constrained Internet of Things
Authors
Keywords
Data security, Audit model, Edge computing, Resource-constrained terminal, Binary tree
Journal
JOURNAL OF SYSTEMS ARCHITECTURE
Volume -, Issue -, Pages 101971
Publisher
Elsevier BV
Online
2020-12-12
DOI
10.1016/j.sysarc.2020.101971
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- IoT Resource Allocation and Optimization Based on Heuristic Algorithm
- (2020) Arun Kumar Sangaiah et al. SENSORS
- Edge-Computing-Based Trustworthy Data Collection Model in the Internet of Things
- (2020) Tian Wang et al. IEEE Internet of Things Journal
- Movement-Based Solutions to Energy Limitation in Wireless Sensor Networks: State of the Art and Future Trends
- (2020) Xuxun Liu et al. IEEE NETWORK
- An Intelligent Video Analysis Method for Abnormal Event Detection in Intelligent Transportation Systems
- (2020) Shaohua Wan et al. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
- Toward Offloading Internet of Vehicles Applications in 5G Networks
- (2020) Shaohua Wan et al. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
- Enforcing Position-Based Confidentiality With Machine Learning Paradigm Through Mobile Edge Computing in Real-Time Industrial Informatics
- (2019) Arun Kumar Sangaiah et al. IEEE Transactions on Industrial Informatics
- A risk defense method based on microscopic state prediction with partial information observations in social networks
- (2019) YouKe Wu et al. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
- An incentive-based protection and recovery strategy for secure big data in social networks
- (2019) Youke Wu et al. INFORMATION SCIENCES
- Edge-based differential privacy computing for sensor–cloud systems
- (2019) Tian Wang et al. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
- Energy-Aware Green Adversary Model for Cyberphysical Security in Industrial System
- (2019) Arun Kumar Sangaiah et al. IEEE Transactions on Industrial Informatics
- Secure and Trust-Oriented Edge Storage for Internet of Things
- (2019) Junxu Xia et al. IEEE Internet of Things Journal
- Lightweighted Secure Searching Over Public-Key Ciphertexts for Edge-Cloud-Assisted Industrial IoT Devices
- (2019) Wei Wang et al. IEEE Transactions on Industrial Informatics
- Privacy-Enhanced Data Collection Based on Deep Learning for Internet of Vehicles
- (2019) Tian Wang et al. IEEE Transactions on Industrial Informatics
- A survey on security issues in services communication of Microservices-enabled fog applications
- (2018) Dongjin Yu et al. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
- Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks
- (2018) Debiao He et al. IEEE Systems Journal
- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage
- (2018) Wenting Shen et al. IEEE Transactions on Information Forensics and Security
- Binarized-octree generation for Cartesian adaptive mesh refinement around immersed geometries
- (2018) Jaber J. Hasbestan et al. JOURNAL OF COMPUTATIONAL PHYSICS
- A survey on Proof of Retrievability for cloud data integrity and availability: Cloud storage state-of-the-art, issues, solutions and future trends
- (2018) Choon Beng Tan et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures
- (2018) Jian Xu et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Introduction to the special issue on “Embedded Artificial Intelligence and Smart Computing”
- (2018) Zonghua Gu et al. JOURNAL OF SYSTEMS ARCHITECTURE
- Cloud-Based Fine-Grained Health Information Access Control Framework for LightweightIoT Devices with Dynamic Auditing andAttribute Revocation
- (2018) Lo-Yao Yeh et al. IEEE Transactions on Cloud Computing
- Big Data Privacy Preserving in Multi-Access Edge Computing for Heterogeneous Internet of Things
- (2018) Miao Du et al. IEEE COMMUNICATIONS MAGAZINE
- Privacy-preserving auditing scheme for shared data in public clouds
- (2018) Libing Wu et al. JOURNAL OF SUPERCOMPUTING
- Multi-Model Framework for Indoor Localization under Mobile Edge Computing Environment
- (2018) Wenjun Li et al. IEEE Internet of Things Journal
- Privacy-preserving public auditing for secure data storage in fog-to-cloud computing
- (2018) Hui Tian et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Traffic and Computation Co-Offloading With Reinforcement Learning in Fog Computing for Industrial Applications
- (2018) Yixuan Wang et al. IEEE Transactions on Industrial Informatics
- Blockchain for Secure and Efficient Data Sharing in Vehicular Edge Computing and Networks
- (2018) Jiawen Kang et al. IEEE Internet of Things Journal
- Enhancing Security of FPGA-Based Embedded Systems with Combinational Logic Binding
- (2017) Ji-Liang Zhang et al. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY
- Robust dynamic network traffic partitioning against malicious attacks
- (2017) Bing Xiong et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Efficient and secure attribute-based signature for monotone predicates
- (2016) Ke Gu et al. ACTA INFORMATICA
- An optimal data service providing framework in cloud radio access network
- (2016) Yuansheng Luo et al. EURASIP Journal on Wireless Communications and Networking
- A Real-Time Dynamic Pricing Algorithm for Smart Grid With Unstable Energy Providers and Malicious Users
- (2016) Qiang Tang et al. IEEE Internet of Things Journal
- Dynamic Provable Data Possession
- (2015) C. Chris Erway et al. ACM Transactions on Information and System Security
- PDLK: Plagiarism detection using linguistic knowledge
- (2015) Asad Abdi et al. EXPERT SYSTEMS WITH APPLICATIONS
- Frama-C: A software analysis perspective
- (2015) Florent Kirchner et al. FORMAL ASPECTS OF COMPUTING
- Efficient Identity-Based Proxy Signature in the Standard Model
- (2013) K. Gu et al. COMPUTER JOURNAL
- Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
- (2010) Qian Wang et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started